hacker PHI training network IP spyware phishing smishing IPS vishing EDR risk assessment incident response rootkit BEC risk firewall malware resilience FTP bug cryptography cyber attack botnet spoofing ransomware IoT VPN Defense- in-depth Cyber Defense worm insider threat antivirus defense evasion security awareness pentest IDS virus passphrase zero- day vulnerability Dark Web security policy spam business continuity HIPAA OS availability identity theft DDoS Security Operations confidentiality integrity CIA triad IOC password social engineering admin APT Cyber Security packet incident WISP Proofpoint encryption SyssecAdmin MFA PII breach compliance escalation exploit hacker PHI training network IP spyware phishing smishing IPS vishing EDR risk assessment incident response rootkit BEC risk firewall malware resilience FTP bug cryptography cyber attack botnet spoofing ransomware IoT VPN Defense- in-depth Cyber Defense worm insider threat antivirus defense evasion security awareness pentest IDS virus passphrase zero- day vulnerability Dark Web security policy spam business continuity HIPAA OS availability identity theft DDoS Security Operations confidentiality integrity CIA triad IOC password social engineering admin APT Cyber Security packet incident WISP Proofpoint encryption SyssecAdmin MFA PII breach compliance escalation exploit
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
hacker
PHI
training
network
IP
spyware
phishing
smishing
IPS
vishing
EDR
risk assessment
incident response
rootkit
BEC
risk
firewall
malware
resilience
FTP
bug
cryptography
cyber attack
botnet
spoofing
ransomware
IoT
VPN
Defense-in-depth
Cyber Defense
worm
insider threat
antivirus
defense evasion
security awareness
pentest
IDS
virus
passphrase
zero-day
vulnerability
Dark Web
security policy
spam
business continuity
HIPAA
OS
availability
identity theft
DDoS
Security Operations
confidentiality
integrity
CIA triad
IOC
password
social engineering
admin
APT
Cyber Security
packet
incident
WISP
Proofpoint
encryption
SyssecAdmin
MFA
PII
breach
compliance
escalation
exploit